Security Intelligence Podcast-logo

Security Intelligence Podcast

135 Favorites

More Information


United States




Better Than Mr. Robot: Penetration Testing with X-Force Red

In this episode of our ongoing series featuring members of the IBM X-Force Red team, North American Regional Lead Steve Ocepek offers a glimpse into the world of elite penetration testing. While he can't reveal all the tricks of the trade, Steve does discuss how the X-Force Red brand has grown and evolved over the past year, what makes an ideal candidate to join the team and why X-Force Red takes a collaborative, team-oriented approach to pen testing. To learn more about X-Force Red or to...

Duration: 00:11:48

DCH 05 Understanding The Media Hacks Of 2017

Episode 5 of the monthly "Deciphering the Cyber Headlines" series. Summer is meant to be a time for blockbuster movies and TV spectaculars, but were hackers the big winner of the 2017 season? In this podcast, Paul and Chris discuss the media hacks of the past few months, emphasizing the role played by third-party vendors. To learn more about how identity and access management solutions can help protect your sensitive data, read the IBM white paper: And for more...

Duration: 00:16:09

'Cracken' Passwords with EvilMog of IBM X-Force Red

In this podcast, Dustin Heywood, aka EvilMog, of IBM X-Force Red talks about the latest trends in password hacking. He also discusses his experience creating the Cracken, a powerful password-cracking rig that debuted at Black Hat 2017 and will be used to help organizations discover and defend against cyberattacks. To learn more about X-Force Red or to schedule a demo, visit: You can also stay up to date by following EvilMog [] and Dillon Townsel...

Duration: 00:08:32

A CISO’s Guide To Obtaining Budget: Exploit Pet Projects [6/6]

This is episode 6 of the "CISO’s Guide to Obtaining Budget" podcast series. To hear the entire series, visit In this concluding episode of this series, guest speaker John Dickson, principal and co-founder at Denim Group, focuses on how CISOs can add security components to CAPEX projects, effectively positioning themselves “upstream” of security needs. Understanding where and when to insert security initiatives into larger projects is a common denominator of success for many...

Duration: 00:16:25

CISO’s Guide To Obtaining Budget: Never Waste A Good Crisis (or Data Breach)[5/6]

This is episode 5 of the "CISO’s Guide to Obtaining Budget" podcast series. Unlike most resource allocation decisions within the enterprise, decisions involving security projects are often influenced by external events, namely data breaches encountered by other organizations in one's own sector or industry. Today, guest speaker John Dickson, principal and co-founder at Denim Group, looks at how CISOs can take advantage of external breach stories to demonstrate the tangible need for...

Duration: 00:16:55

A CISO’s Guide To Obtaining Budget: Consciously Cultivating Credibility [4/6]

This is episode 4 of the "CISO’s Guide to Obtaining Budget" podcast series. Today, guest speaker John Dickson, principal and co-founder at Denim Group, explains why CISOs must be deliberate in their efforts to cultivate credibility. Those who approach the executive team only to ask for money or when a crisis is underway are less likely to have their requests met. To discover what’s impacting today’s CISO, visit the IBM website [] and the CISO Corner [] on...

Duration: 00:13:08

A CISO’s Guide To Obtaining Budget: Know Yourself [3/6]

This is episode 3 of the "CISO’s Guide to Obtaining Budget" podcast series. Today, guest speaker John Dickson, principal and co-founder at Denim Group, highlights the value of knowing oneself and one's organization before appealing for funds and resources. Understanding how security fits into the larger corporate culture is crucial, as is cataloging all assets and liabilities that will influence conversations with the executive team. To discover what’s impacting today’s CISO, visit the IBM...

Duration: 00:13:34

A CISO’s Guide to Obtaining Budget: Know Your Audience

This is episode 2 of the "CISO’s Guide to Obtaining Budget" podcast series. Today, guest speaker John Dickson, principal and co-founder at Denim Group, offers advice for CISOs and security leaders looking to communicate more effectively and meaningfully with non-technical executives who may not feel fully comfortable making decisions on technical matters. Listen now to learn how successful security leaders translate abstract technical issues into straightforward risks that any executive...

Duration: 00:14:02

A CISO’s Guide To Obtaining Budget: The Nature Of The Problem

This podcast is the first in a six-part series examining the difficult task of securing resources. In each episode, John Dickson [], principal and co-founder at Denim Group, will discuss challenges and share recommendations for how chief information security officers (CISOs) should approach the task of obtaining budget. This first episode introduces the "CISO’s Guide to Obtaining Budget" series and explains why spending on cybersecurity projects differs significantly...

Duration: 00:11:08

IBM and Check Point: Taking On Security Challenges In Asia Pacific And Around The World

Organizations around the world confront serious security challenges every day, and companies in the Asia-Pacific region are no exception. In this podcast, Evan Dumas, Head of Emerging Technologies for APAC, Middle East and Africa at Check Point Software, joins Deepraj Emmanuel Datt, Solution Design Leader at IBM Security Services Asia-Pacific, for a conversation about the key security challenges facing their clients and best practices for fighting back. Listen now to learn not only how IBM...

Duration: 00:16:46

Current Developments in Application Security Testing: An Interview with Neil Jones

How can anyone hope to stay current with rapidly-evolving application security trends and technological advancements in an environment that's increasingly characterized by resource constraints and skills gaps? A good first step is to listen to this short podcast, in which Neil Jones, IBM’s Market Segment Manager for Application Security, discusses major trends in app sec, key client concerns and what’s new in the world of IBM’s application security testing. After listening to the podcast,...

Duration: 00:03:59

Cyber Beat Live: More Than Threat Hunting — Identify Connections And Visualize Data With IBM i2

Meet IBM i2, the newest addition to the IBM Security portfolio. i2 has roots in both law enforcement and the intelligence community, where it's been used for nearly three decades. Today, these same tools are becoming a critical component of many organizations' cyber defense operations. In this podcast, host Bob Stasio and his expert panel, consisting of Mike McCracken of IBM and Katie Crotty and Dave Williams of Praescient Analytics, trace the evolution of i2. They also share a variety of...

Duration: 00:27:19

Talking Offensive Security With Space Rogue Of X - Force Red

Cris Thomas, better known within the security community as Space Rogue, joined IBM X-Force Red as global strategy lead earlier this summer. In this podcast, he reflects on how his career has evolved over the past two decades and how events like Black Hack and DEF CON have also changed over the same period. To learn more about X-Force Red or to schedule a demo, visit: You can also stay up to date by following Space Rogue on Twitter: Recommended...

Duration: 00:05:58

Can Cognitive Security Change The Economics Of Cybercrime?

Cybercrime is a booming business, and today's cybercriminals are better organized and more motivated than ever. In this podcast, Michael Ash, Associate Partner for Cybersecurity at IBM Security, talks about the current cybercrime landscape and why it is so difficult to identify and contain fast-moving threats like WannaCry. After describing the many challenges that security teams face, Michael turns to the good news: Cognitive security has arrived and will be a game changer in terms of...

Duration: 00:22:17

The Hunter Becomes the Hunted: The Value Of Red On Blue Cyber Training

A good policeman is able to understand how the criminal carried out the crime. Shouldn't the same be true for security professionals? In this podcast, John Clarke, Jason Flood, Maria Hyland and Trevor McWeeney, all of IBM Ireland, have a spirited conversation about the many benefits of red on blue cyber training. Listen now, and read the accompanying blog [], to learn all about red on blue cyber training, including whether the blue team needs to win in order for the...

Duration: 00:10:05

Midyear Threat Landscape with Kevin Albano of IBM X-Force IRIS

The first half of 2017 passed in a flash, though it may not always have felt that way to members of IBM X-Force Incident Response and Intelligence Services (IRIS). In this podcast, Kevin Albano, X-Force IRIS Global Lead for Threat Intelligence, discusses the major cyber attacks of the past few months, including Shamoon, WannaCry and Petya, and examines some of the trends he and his team have identified so far in 2017. Kevin also make predictions for the months ahead (spoiler alert:...

Duration: 00:06:36

The Evolution of Consumer IoT: The Challenges and the Promise

In this podcast, IBM Executive Security Advisor Diana Kelley talks with cybersecurity thought leader and SecureMySocial CEO, Joseph Steinberg, about the many challenges associated with securing the Internet of Things (IoT), particularly when it comes to consumer goods like smart refrigerators and connected cars. After discussing why consumer IoT security tends to be relatively lax (spoiler: it relates to evolutionary biology!), Joseph and Diana conclude the podcast with recommendations for...

Duration: 00:17:41

Hacking Cars, IoT Devices and Passwords: IBM X-Force Red Turns One

In this exclusive podcast Charles Henderson, Global Head of IBM's X-Force Red, discusses some of his team's top achievements over the past year and offers a preview of what lies ahead, both at Black Hat this week and beyond. Listen now to hear Charles' take on the challenges of automotive testing and the pitfalls of discreet testing versus solution testing. You'll also learn how the Red Portal, introduced earlier this year, promotes collaboration between testers and developers and how IBM...

Duration: 00:18:53

Nuclear Facilities Under Attack And Cross-Industry Lessons In Cybersecurity

In their latest podcast, Paul Ferrillo and Chris Veltsos talk with IBM’s Mitch Mayne about the recent targeting of nuclear plants and other energy facilities by cybercriminals. While critical infrastructure systems do face some unique security challenges, many of the lessons learned from these attacks can be applied to other industries as well. Listen now to learn why Chris and Paul expect today’s highly targeted attacks to ultimately spread out across industries. You’ll also get an...

Duration: 00:19:12

Fighting Petya at Ground Zero: An Interview with Dmytro Kyselyov of IBM Ukraine

Dmytro Kyselyov, a Delivery Project Executive at IBM Ukraine, faced the June 27, 2017 Petya variant outbreak from ground zero. In this exclusive podcast, Dmytro talks with IBM Executive Security Advisor Diana Kelley about how he and his team reacted to this zero-day attack. Even in the face of numerous unknowns about what exactly they were up against, IBMers on the ground in Ukraine took immediate action to begin protecting themselves and their clients. For a more technical look at this...

Duration: 00:16:51

See More